Skip to main content

Day 2 Part 1: Introduction to Reverse Engineering Software




Get the class materials to follow along at
http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html
Follow us on Twitter for class news @OpenSecTraining
or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html

Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to understand how they work. This is Reverse Engineering (RE), and it is done every day from recreating outdated and incompatible software, understanding malicious code, or exploiting weaknesses in software.

In this course by Matt Briggs, we will explore what drives people to reverse engineer software and the methodology and tools used to do it.

Topics include, but are not limited to:
* Uses for RE
* The tricks and pitfalls of analyzing compiled code
* Identifying calling conventions
* How to navigate x86 assembly using IDA Pro
* Identifying Control Flows
* Identifying the Win32 API
* Using a debugger to aid RE
* Dynamic Analysis tools and techniques for RE

During the course students will complete many hands on exercises.

Introductory Intel x86 (http://www.OpenSecurityTraining.info/IntroX86.html) is a direct and very necessary prerequisite which should be taken before this class. This class will serve as a prerequisite for a later class on malware static analysis.


Producer Matt Briggs

Reviews

There are no reviews yet. Be the first one to write a review.
PEOPLE ALSO FOUND